antivirus cyber attack Cyber Defense incident insider threat spyware WISP virus encryption OS Proofpoint resilience confidentiality IOC security awareness zero- day malware FTP integrity rootkit firewall VPN SyssecAdmin vulnerability PII Security Operations IoT EDR botnet cryptography training incident response Dark Web Defense- in-depth social engineering admin MFA worm availability spoofing security policy pentest vishing compliance network risk assessment business continuity escalation DDoS defense evasion identity theft breach risk BEC password CIA triad IDS bug phishing passphrase smishing spam exploit HIPAA Cyber Security ransomware hacker IP APT PHI packet IPS antivirus cyber attack Cyber Defense incident insider threat spyware WISP virus encryption OS Proofpoint resilience confidentiality IOC security awareness zero- day malware FTP integrity rootkit firewall VPN SyssecAdmin vulnerability PII Security Operations IoT EDR botnet cryptography training incident response Dark Web Defense- in-depth social engineering admin MFA worm availability spoofing security policy pentest vishing compliance network risk assessment business continuity escalation DDoS defense evasion identity theft breach risk BEC password CIA triad IDS bug phishing passphrase smishing spam exploit HIPAA Cyber Security ransomware hacker IP APT PHI packet IPS
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
antivirus
cyber attack
Cyber Defense
incident
insider threat
spyware
WISP
virus
encryption
OS
Proofpoint
resilience
confidentiality
IOC
security awareness
zero-day
malware
FTP
integrity
rootkit
firewall
VPN
SyssecAdmin
vulnerability
PII
Security Operations
IoT
EDR
botnet
cryptography
training
incident response
Dark Web
Defense-in-depth
social engineering
admin
MFA
worm
availability
spoofing
security policy
pentest
vishing
compliance
network
risk assessment
business continuity
escalation
DDoS
defense evasion
identity theft
breach
risk
BEC
password
CIA triad
IDS
bug
phishing
passphrase
smishing
spam
exploit
HIPAA
Cyber Security
ransomware
hacker
IP
APT
PHI
packet
IPS